A method and apparatus are provided for controlling a cache. The cache includes a plurality of storage locations, each having a priority associated therewith, and wherein the cache evicts data from one or more of the storage locations based on the priority associated therewith. The method comprises: storing historical information regarding data being evicted from the cache; retrieving data from a secondary memory in response to a miss in the cache; assigning a priority to the retrieved data based on the historical information; and storing the retrieved data in the cache with an indication of the assigned priority.
|
9. A cache controller associated with a cache, wherein the cache includes a plurality of storage locations, each having a priority associated therewith, wherein data is evicted from one or more of the storage locations based on the priority associated therewith, the cache control comprising:
a historic information check adapted to store historical information indicating a plurality of different memory addresses associated with data being evicted from the cache;
a cache refill control adapted to receive data retrieved from a secondary memory, assign a priority to the retrieved data based on the historical information, and store the retrieved data in the cache with an indication of the assigned priority; and
wherein the historic information check is adapted to reset the historical information in response to a number of different memory addresses indicated by the historical information exceeding a preselected number.
1. A method for controlling a cache, wherein said cache includes a plurality of storage locations, each having a priority associated therewith, wherein the cache evicts data from one or more of the storage locations based on the priority associated therewith, the method comprising:
storing historical information;
modifying the historical information from an initial state to a modified state indicating a plurality of different memory addresses associated with data being evicted from the cache;
retrieving data from a secondary memory in response to a miss in the cache;
assigning a priority to the retrieved data based on the historical information;
storing the retrieved data in the cache with an indication of the assigned priority; and
resetting the historical information to the initial state in response to a number of different memory addresses indicated by the historical information exceeding a preselected number.
2. A method, as set forth in
3. A method, as set forth in
4. A method, as set forth in
5. A method, as set forth in
6. A method, as set forth in
7. A method, as set forth in
8. A method, set forth in
10. A cache control, as set forth in
11. A cache control, as set forth in
12. A cache control, as set forth in
13. A cache control, as set forth in
14. A cache control, as set forth in
|
Not applicable.
The disclosed subject matter relates generally to memory systems, and, more particularly, to reducing power consumption of a memory system.
Memory in a processor system commonly includes a temporary storage system that includes both dynamic random access memory (DRAM) and one or more caches formed from static random access memory (SRAM). Generally, DRAM is relatively inexpensive, and thus, is commonly employed in large blocks to store large volumes of data, but is relatively slow when retrieving the data. Caches, on the other hand, are constructed from high-speed SRAM cells that are substantially faster than DRAM, but are relatively more expensive.
Many processor systems employ a relatively small cache and a relatively large DRAM. Commonly, this type of processor system is designed such that the cache is loaded with a subset of the data found in the DRAM that is likely to be used by the processor system. Thus, the processor system normally accesses the high-speed cache, and only occasionally accesses the lower-speed DRAM. By carefully selecting the subset of data loaded into the cache, the processor system can operate at a relatively high speed without the expensive of including a large block of high-speed cache.
Since the cache is holding only a subset of the data that may be accessed by the processor system, “misses” will occasionally occur when the processor system requests data that has not been loaded into the cache. When such a miss occurs, the memory system will access DRAM to retrieve the desired data, and the retrieved data will be loaded or “filled” into the cache. Of course, if the cache is full, then the cache will need to eject or otherwise remove some old data from the cache to make room for the newly retrieved data.
In some applications, caches generally treat all data fills the same way: store the new data in a most recently used (MRU) location in the cache because the new data is assumed to be “useful,” in that it will be accessed or “touched” again. The general presumption that all data, because it have been touched once will be touched again in the near future, has been extremely useful in the past and generated good performance benefits, and the pain of being wrong has been generally bearable. Thus, caches have typically erred on the side of caution and the set of data in a cache generally significantly exceeds the set of data that will be touched again. However, increasing pressure on caches from multiple directions makes it increasingly important to be able to use cache space more efficiently by having its space taken up by more useful data, i.e. data that will be reused.
The following presents a simplified summary of the disclosed subject matter in order to provide a basic understanding of some aspects of the disclosed subject matter. This summary is not an exhaustive overview of the disclosed subject matter. It is not intended to identify key or critical elements of the disclosed subject matter or to delineate the scope of the disclosed subject matter. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is discussed later.
One aspect of the disclosed subject matter is seen in a method for controlling a cache, wherein the cache includes a plurality of storage locations, each having a priority associated therewith, and wherein the cache evicts data from one or more of the storage locations based on the priority associated therewith. The method comprises: storing historical information regarding data being evicted from the cache; retrieving data from a secondary memory in response to a miss in the cache; assigning a priority to the retrieved data based on the historical information; and storing the retrieved data in the cache with an indication of the assigned priority.
Another aspect of the disclosed subject matter is seen in a cache control, wherein a cache includes a plurality of storage locations, at least some of the storage locations having a priority associated therewith, and wherein data is evicted from one or more of the storage locations based on the priority associated therewith. The cache control comprises a historic information check and a cache refill control. The historic information check is adapted to store historical information regarding data being evicted from the cache. The cache refill control is adapted to receive data retrieved from a secondary memory, assign a priority to the retrieved data based on the historical information, and store the retrieved data in the cache with an indication of the assigned priority.
The disclosed subject matter will hereafter be described with reference to the accompanying drawings, wherein like reference numerals denote like elements, and:
While the disclosed subject matter is susceptible to various modifications and alternative forms, specific embodiments thereof have been shown by way of example in the drawings and are herein described in detail. It should be understood, however, that the description herein of specific embodiments is not intended to limit the disclosed subject matter to the particular forms disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the disclosed subject matter as defined by the appended claims.
One or more specific embodiments of the disclosed subject matter will be described below. It is specifically intended that the disclosed subject matter not be limited to the embodiments and illustrations contained herein, but include modified forms of those embodiments including portions of the embodiments and combinations of elements of different embodiments as come within the scope of the following claims. It should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions may be made to achieve the developers' specific goals, such as compliance with system-related and business related constraints, which may vary from one implementation to another. Moreover, it should be appreciated that such a development effort might be complex and time consuming, but may nevertheless be a routine undertaking of design, fabrication, and manufacture for those of ordinary skill having the benefit of this disclosure. Nothing in this application is considered critical or essential to the disclosed subject matter unless explicitly indicated as being “critical” or “essential.”
The disclosed subject matter will now be described with reference to the attached figures. Various structures, systems and devices are schematically depicted in the drawings for purposes of explanation only and so as to not obscure the disclosed subject matter with details that are well known to those skilled in the art. Nevertheless, the attached drawings are included to describe and explain illustrative examples of the disclosed subject matter. The words and phrases used herein should be understood and interpreted to have a meaning consistent with the understanding of those words and phrases by those skilled in the relevant art. No special definition of a term or phrase, i.e., a definition that is different from the ordinary and customary meaning as understood by those skilled in the art, is intended to be implied by consistent usage of the term or phrase herein. To the extent that a term or phrase is intended to have a special meaning, i.e., a meaning other than that understood by skilled artisans, such a special definition will be expressly set forth in the specification in a definitional manner that directly and unequivocally provides the special definition for the term or phrase.
Referring now to the drawings wherein like reference numbers correspond to similar components throughout the several views and, specifically, referring to
In one embodiment, the processor 101 employs a pair of substantially similar modules, module A 110 and module B 115. The modules 110, 115 are substantially similar and include processing capability (as discussed below in more detail in conjunction with
Turning now to
The processor core 200 also includes components that are exclusive to it. For example, the processor core 200 includes an integer scheduler 210, four substantially similar, parallel pipelines 215, 216, 217, 218, and an L1 Cache 225. Likewise, the processor core 201 includes an integer scheduler 219, four substantially similar, parallel instruction pipelines 220, 221, 222, 223, and an L1 Cache 230.
The operation of the module 110 involves the fetch circuitry 203 retrieving instructions from memory, and the decode circuitry 205 operating to decode the instructions so that they may be executed on one of the available pipelines 215-218, 220-223. Generally, the integer schedulers 210, 219 operate to assign the decoded instructions to the various instruction pipelines 215-218, 220-223 where they are speculatively executed. During the speculative execution of the instructions, the instruction pipelines 215-218, 220-223 may access the corresponding L1 Caches 225, 230, the shared L2 Cache 235, the shared L3 cache 120 and/or the external memory 105. Operation of the L1 Caches 225, 230 and the L2 Cache 235 may each be controlled by corresponding Cache Controls 240, 245, 250. Generally, the caches and external memory are arranged in a hierarchical fashion with the L1B and L1A Caches 230, 240 at the highest or first level, the L2 Cache 250 at the second level, the L3 Cache 120 at the third level, and external memory 105 at the fourth level. Thus, any request from data will be sequentially submitted through each hierarchical level until it is found and retrieved. For example, an exemplary request for data begins with an inspection of the L1B Cache 230 first for the requested data. In the event that the requested data is not found in the L1B cache 230, then the L2 Cache 250 is inspected for this same data. A hit in the L2 Cache 250 causes the desired data to be retrieved therefrom and delivered to the first level L1B cache 230 and stored therein. In the event that the L1B cache 230 is already full, then the L1B cache controller 245 will evict an entry from the L1B Cache 230, and the evicted entry will be delivered to and stored in the L2 Cache 235. Similar interoperations occur between the L2 and L3 Caches 235, 120 and between the L3 Cache 120 and the external memory 105.
Those skilled in the art will appreciate that the cache controls 122, 240, 245, 250 may be implemented as completely separate devices with little or no interaction therebetween, they may be implemented as devices that share some components, or they may be implemented as a single device capable of managing the operation of all of the caches 120, 225, 230, 235.
In one embodiment, it may be useful to control the refill and eviction processes for one or more of the caches 120, 225, 230, 235 to increase the likelihood that each of the caches 120, 225, 230, 235 will retain entries that are likely to be requested during the operation of the processor 101. Turning now to
Generally, the L1B Cache 230 may take on any of a variety of forms, however, for purposes of illustrating the instant embodiment, the L1B Cache 230 is a set associative cache having a plurality of entries, lines or blocks 300-310 that are prioritized to indicate the likelihood that they will be requested by the processor 101. For example, the entry 300 is identified as having the highest priority and is designated as the Most Recently Used (MRU) entry 300. Conversely, the entry 310 is identified as having the lowest priority and is designated as the Least Recently Used (LRU) entry 310. The entry 305 represents a plurality of entries that have varying priority intermediate the highest and lowest priorities. Those skilled in the art will appreciate that the priority of the entries 300, 305, 310 may be designated by physical location/order within the L1B Cache 230, priority tags/pointers/flags (not shown), or similar conventional methodologies.
When the L1B Cache 230 is full, with each entry 300-310 containing a valid entry, and a miss occurs in the L1B Cache 230, one of the existing entries in the L1B Cache 230 will need to be evicted and “refilled” or “replaced” with a desired new entry that is retrieved from, for example, the L2 Cache 235. Generally, a Cache Refill Control 315 in the L1B Cache Control 245 controls this refill. A Historic or Heuristic Information Check 320 receives the new entry from the L2 Cache 235 and determines the recent history of the new entry, such as whether the new entry has recently been located within the L1B Cache 230. The Cache Refill Control 315 utilizes the recent history information to determine the relative priority of the new entry and store the new entry in the L1B Cache 230 at the appropriate location or with the appropriate priority indicator. For example, if the new entry has recently been evicted from the L1B Cache 230 numerous times, then the Cache Refill Control 315 assigns a high priority to the new entry and stores the new entry as the Most Recently Used entry 300. On the other hand, if the new entry has not recently been evicted from the L1B Cache 230, then the Cache Refill Control 315 can assign a low priority to the new entry and store the new entry as the Least Recently Used entry 300. Alternatively, if the new entry has recently been evicted a relatively moderate number of times from the L1B Cache 230, then the Cache Refill Control 315 can assign a moderate priority to the new entry and store the new entry as one of the intermediate entries 305.
In one embodiment, the Historic Information Check 320 can be updated each time an entry is evicted from the L1B Cache 230. Accordingly, as shown in
Turning now to
The Bloom filter 400 allows elements to be added and queries to be made. Each time an entry is evicted from the L1B Cache 230, its address is stored in the Bloom Filter 400. Likewise, each time an entry is received from the L2 Cache 235, its address is used to query the Bloom filter 400 to determine if it is already a member of the Bloom filter 400. If the Bloom filter 400 identifies the address of the entry received from the L2 Cache 235 as being present therein, then the entry has recently been evicted from the L1B Cache 230, and the Bloom filter 400 delivers a signal to the Cache Refill Control 300. The Cache Refill Control 300 uses the signal from the Bloom filter 400 to determine the priority of the entry received from the L2 Cache 235 so as to reflect the likelihood that this entry will be used again. That is, a hit in the Bloom filter 400 indicates that the entry has been recently evicted, and thus, is more likely to be accessed in the L1B cache 235 in the near future than an entry that misses in the Bloom filter 400.
As shown in
Generally, the Bloom filter 400 captures a history of reuse on an entry-level granularity in order to distinguish between two types of entries that are brought into the L1B Cache 235: an entry that is probably never going to be seen again (predicted so because it has never been seen before), and an entry that has been seen (and evicted) previously, implying that it will be seen again.
Referring simultaneously to
In one embodiment shown in the flow chart of
In another embodiment shown in the flow chart of
In yet another embodiment shown in the flow chart of
The particular embodiments disclosed above are illustrative only, as the disclosed subject matter may be modified and practiced in different but equivalent manners apparent to those skilled in the art having the benefit of the teachings herein. Furthermore, no limitations are intended to the details of construction or design herein shown, other than as described in the claims below. It is therefore evident that the particular embodiments disclosed above may be altered or modified and all such variations are considered within the scope and spirit of the disclosed subject matter. Accordingly, the protection sought herein is as set forth in the claims below.
Patent | Priority | Assignee | Title |
11061826, | Jun 26 2018 | International Business Machines Corporation | Integration of application indicated minimum time to cache to least recently used track demoting schemes in a cache management system of a storage controller |
11068413, | Jun 26 2018 | International Business Machines Corporation | Allocation of cache storage among applications based on application priority and minimum retention time for tracks in least recently used demoting schemes |
11068417, | Jun 26 2018 | International Business Machines Corporation | Allocation of cache storage among applications that indicate minimum retention time for tracks in least recently used demoting schemes |
11074197, | Jun 26 2018 | International Business Machines Corporation | Integration of application indicated minimum time to cache and maximum time to cache to least recently used track demoting schemes in a cache management system of a storage controller |
11144474, | Jun 26 2018 | International Business Machines Corporation | Integration of application indicated maximum time to cache to least recently used track demoting schemes in a cache management system of a storage controller |
11422948, | Jun 26 2018 | International Business Machines Corporation | Allocation of cache storage among applications that indicate minimum retention time for tracks in least recently used demoting schemes |
11461242, | Jun 26 2018 | International Business Machines Corporation | Integration of application indicated minimum time to cache and maximum time to cache to least recently used track demoting schemes in a cache management system of a storage controller |
11537440, | Dec 19 2019 | Hewlett Packard Enterprise Development LP | Infrastructure adaptive consistency level mechanism |
11561905, | Jun 26 2018 | International Business Machines Corporation | Integration of application indicated minimum time to cache to least recently used track demoting schemes in a cache management system of a storage controller |
Patent | Priority | Assignee | Title |
8244984, | Dec 08 2008 | Nvidia Corporation | System and method for cleaning dirty data in an intermediate cache using a data class dependent eviction policy |
20020156980, | |||
20060143392, | |||
20090019209, | |||
20090271574, | |||
20140129779, | |||
20140181411, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Dec 02 2011 | HSU, LISA | Advanced Micro Devices, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 027340 | /0651 | |
Dec 06 2011 | Advanced Micro Devices, Inc. | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Apr 25 2016 | ASPN: Payor Number Assigned. |
May 02 2019 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
May 15 2023 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Date | Maintenance Schedule |
Nov 17 2018 | 4 years fee payment window open |
May 17 2019 | 6 months grace period start (w surcharge) |
Nov 17 2019 | patent expiry (for year 4) |
Nov 17 2021 | 2 years to revive unintentionally abandoned end. (for year 4) |
Nov 17 2022 | 8 years fee payment window open |
May 17 2023 | 6 months grace period start (w surcharge) |
Nov 17 2023 | patent expiry (for year 8) |
Nov 17 2025 | 2 years to revive unintentionally abandoned end. (for year 8) |
Nov 17 2026 | 12 years fee payment window open |
May 17 2027 | 6 months grace period start (w surcharge) |
Nov 17 2027 | patent expiry (for year 12) |
Nov 17 2029 | 2 years to revive unintentionally abandoned end. (for year 12) |